Connect With Me In Facebook

Welcome to DefendHackers, If u want to Apply for a Blogroll as a Author , With h4ckfreak Mail me @ suren.click@gmail.com

Mark Zuckerberg tells 8th graders “there’s no shortcuts” and to make friends

By h4ckfreak

Tuesday, August 30, 2011

Facebook Recruits NIT Warangal(India) Student For 45lakh per annum

It's raining lucrative jobs at NIT Warangal which has had the best placement season so far. The 51-year-old institute started its recruitment drive on August 15 and already has a 21-year-old fourth year BTech computer science student securing the highest ever pay package of Rs 45 lakh per annum. The offer, made by Facebook, has created a record of sorts here. The institute confirmed that the student will be joining the technical wing of the social networking giant, as soon as he completes his course in March next year. This has set a new benchmark at NIT Warangal in that the highest salary any student from the institute had bagged...

Saturday, August 27, 2011

Reverse Engineering with "pdf2word" Live

In This "tutorial" we will use a real program called PDF2Word. I stumbled upon this program when trying to convert a pdf document to a word document (duh..). The funny thing about this program is that it costs $39.95 and that it is released under the GPL. Let's start shall we? 1: Obtain a copy of the program at http://www.verypdf.com/pdf2word/index.html We will use version 2.6 in this tutorial. 2: Obtain a copy of ollydbg at http://www.ollydbg.de/ Start PDF2Word and you will see a screen with title "Please register .." Type in an emailadress and a bogus Registrationkey and hit OK. Write down the error message you get since we will need...

Hacking Mind, Learn Faster, Be Smart

If someone granted you one wish, what do you imagine you would want out of life that you haven't gotten yet? For many people, it would be self-improvement and knowledge. New knowledge is the backbone of society's progress. Great thinkers such as Leonardo da Vinci, Thomas Edison, Benjamin Franklin, Albert Einstein, and others' quests for knowledge have led society to many of the marvels we enjoy today. Your quest for knowledge doesn't have to be as Earth-changing as Einstein's, but it can be an important part of your life, leading to a new job, better pay, a new hobby, or simply knowledge for knowledge's sake — whatever is important to you as...

Configure SSH Without Password Login Prompt

Password less SSH login to another server can be very useful when you want to configure a remote backup server or when migrating servers. For enabling this you need to have openSSH installed on the server. Here is a tutorial on how to configure password less SSH login to server ‘mars’ from server ‘earth’ 1. Login to earth as root. 2. Run the command ssh-keygen -t rsa If the key already exists you can either go to step 3 or you can generate a new key by overwriting existing key (see image). It would be better to overwrite the existing key if you did not generate it. 3. Change directory to /root/.ssh/ root@earth:~# cd /root/.ssh/ root@earth:~/.ssh# 4....

Friday, August 26, 2011

F.B.I RAT (Full Backdoor Intergration) V0.1

Supports xp/Vista/Windows 7, all features have been tested on these OS's including injection, but there have been some limitations on the sniffer.Features:File Manager: -Execute, Normal & Hidden. -Copy & Paste like Windows explorer. -Display size of file, and type. -Delete. -Download & Upload (re-coded) Multi-threaded downloads, which allows you to download multiple files at once. -Stop, Pause and resume active transfer's. -Search files. -rename files.System Manager: -Process Manager - Refresh and kill processes running -Window Manager - Refresh and close windows, shows hidden and visable windows. -Installed Programs - List's...

Saturday, August 20, 2011

Detecting Web application firewall during Pentesting

It has Always been overlooked by Penetration Testers while Testing Web Applications, most of the Web Applications are Protected by Application firewall & it is not so easy to find which firewall has been using,here comes a tool “WAFW00F” which can fingerprint 20 WAF products this helps a Pentester to find and analyse the WebApplication.http://code.google.com/p/waffit/ WAFW00F allows you fingerprint WAF products protecting a website. The tool as of now can fingerprint 20 WAF products. How can it do that? Possibly, it is looking at the following:* Cookies – Some WAF products add their own cookie in the HTTP communication. * Server Cloaking – Altering URLs and Response Headers. * Response Codes – Different error codes for hostile pages/parameters values. * Drop...

Basics of remote exploits writing

 Many Peoples are Prefering to use the Publicly Available Exploits than Writing their Own..! Let me ask them Why u cant write ur Own Exploits For ur Attack(I am Just Curious about Exploits ,Some exploits available will work only on Specified Service Packs Or Might Not Work If it has been Patched Or Recently Updated)..So I started almost a couple of weeks to go for reading about metaX ,Thanks for Shobit(Hackersbay) for Sharing the Book..Which Helped me a lot to learn, and am Just has digged my head Into The Ocean Of Exploits Writing i Want to show you all Whaat i Been Doing all Day in a week , i hope my Last post regarding Xploit Writing...

Pages 381234 »